The online-tsp against fair adversaries

Similar documents
The Online Target Date Assignment Problem

Lot-sizing and flow production in an MRP-environment

Extensions to the manpower planning system Formasy

Reoptimization Gaps versus Model Errors in Online-Dispatching of Service Units for ADAC

Case study of a batch-production/inventory system

Combinatorial Online Optimization

Production error analysis for a line of manufacturing machines, variable structure control approach Starkov, K.; Pogromskiy, A.Y.; Rooda, J.E.

Mixed-integer linear program for an optimal hybrid energy network topology Mazairac, L.A.J.; Salenbien, R.; de Vries, B.

SINGLE MACHINE SEQUENCING. ISE480 Sequencing and Scheduling Fall semestre

Mathematical Aspects of Logistics

Decomposed versus integrated control of a one-stage production system Sierksma, Gerardus; Wijngaard, Jacob

Published in: Proceedings of the RILEM International workshop on performance-based specification and control of concrete durability

On-Line Restricted Assignment of Temporary Tasks with Unknown Durations

Enabling big data to increase output at NXP semiconductor operations Wiers, V.C.S.; de Kok, A.G.; Dijkman, R.M.

Opportunism is required to meet software demand

An Optimal Service Ordering for a World Wide Web Server

New Results for Lazy Bureaucrat Scheduling Problem. fa Sharif University of Technology. Oct. 10, 2001.

The transformation factor: a measure for the productive behaviour of a manufacturing process de Ron, A.J.

WE consider the dynamic pickup and delivery problem

FIRST FUNDAMENTAL THEOREM OF WELFARE ECONOMICS

On-line Multi-threaded Scheduling

A multi-item spare parts inventory model with customer differentiation

On- and Offline Scheduling of Bidirectional Traffic

The Price of Anarchy in an Exponential Multi-Server

Barge rotation planning and quay scheduling in the port of Rotterdam Douma, A.; Schuur, P.C.; Schutten, J.M.J.

Technology transfer in a horizontally differentiated product-market

Document Version Publisher s PDF, also known as Version of Record (includes final page, issue and volume numbers)

Scheduling Problems in the Lot Production Lines of the Toyota Production System

The Use of System Identification Tools in MatLab for Transfer Functions van Schijndel, A.W.M.

A sound indoor climate for a museum in a monumental building Schellen, H.L.; Martens, M.H.J.

Electroplating of gold using a sulfite-based electrolyte

A sound indoor climate for a museum in a monumental building Schellen, H.L.; Martens, M.H.J.

Published in: Proceedings of the 20th Annual Symposium of the IEEE Photonics Benelux Chapter, November 2015, Brussels, Belgium

Limits of Software Reuse

Structural application of perforated aluminium plates in a footbridge canopy van Hove, B.W.E.M.; Soetens, F.

Risk-based maintenance and replacement strategy for protection relays Morren, J.; Berende, M.J.C.

Optimal Control of Hybrid Systems in Manufacturing

CS269I: Incentives in Computer Science Lecture #16: Revenue-Maximizing Auctions

Electron micrographic digital image correlation : method optimization and microstructural banding case study

An Approach to Predicting Passenger Operation Performance from Commuter System Performance

Searching for the Possibility Impossibility Border of Truthful Mechanism Design

Document Version Publisher s PDF, also known as Version of Record (includes final page, issue and volume numbers)

COMP Online Algorithms

CS364B: Frontiers in Mechanism Design Lecture #11: Undominated Implementations and the Shrinking Auction

Evaluating the quality of discovered process models

The human body as its own sensor for thermal comfort

Eindhoven University of Technology MASTER. Measuring and improving productivity in a job shop environment the applicability of the ProMES methodology

The Simultaneous Vehicle Scheduling and Passenger Service Problem

Premature failure of poly-l/d-lactide bioresorbable spinal cages; Pittfalls in designing in time-dependent materials

Modeling of competition in revenue management Petr Fiala 1

Lecture 5: Minimum Cost Flows. Flows in a network may incur a cost, such as time, fuel and operating fee, on each link or node.

Energy Efficient Fixed-Priority Scheduling for Real-Time Systems on Variable Voltage Processors

The comprehensive housing renovation approach

A multi-item periodic replenishment policy with full truckloads Kiesmuller, G.P.

Comsol Multiphysics for building energy simulation (BES) using BESTEST criteria Jacobs, P.M.; van Schijndel, A.W.M.

Heuristic Techniques for Solving the Vehicle Routing Problem with Time Windows Manar Hosny

A Walrasian Theory of Commodity Money: Paradoxical Results *

Scheduling theory, part 1

Fiber Bragg grating sensor based on external cavity laser

Understanding Customer Choice Processes Using Neural Networks. Walter A. Kosters, Han La Poutré and Michiel C. van Wezel

University of Groningen. Effective monitoring and control with intelligent products Meyer, Gerben Gerald

Document Version Publisher s PDF, also known as Version of Record (includes final page, issue and volume numbers)

Research Article Integrated Production-Distribution Scheduling Problem with Multiple Independent Manufacturers

Performance management systems: a global perspective.

Performance management systems: a global perspective.

Seller-Focused Algorithms for Online Auctioning

Dynamic Vehicle Routing for Translating Demands: Stability Analysis and Receding-Horizon Policies

Section 1: Introduction

CS364B: Frontiers in Mechanism Design Lecture #17: Part I: Demand Reduction in Multi-Unit Auctions Revisited

IEOR 251 Facilities Design and Logistics Spring 2005

Exports, R&D and Productivity: A test of the Bustos-model with enterprise data from France, Italy and Spain Wagner, Joachim

Supply Chain Management with Online Customer Selection

Online shopping and platform design with ex ante registration requirements. Online Appendix

Powered by TCPDF (

Document Version Publisher s PDF, also known as Version of Record (includes final page, issue and volume numbers)

General Equilibrium for the Exchange Economy. Joseph Tao-yi Wang 2013/10/9 (Lecture 9, Micro Theory I)

SCHEDULING AND CONTROLLING PRODUCTION ACTIVITIES

WEAK AND STRICT DOMINANCE: A UNIFIED APPROACH

American Association for Public Opinion Research

Inter-Terminal Transport with uncertain connections

Pricing in Dynamic Advance Reservation Games

Tilburg University. The repeated lake game Brock, W.A.; de Zeeuw, Aart. Published in: Economics Letters. Publication date: Link to publication

Determination of the chloride diffusion coefficient in blended cement mortars Elfmarkova, V.; Spiesz, P.R.; Brouwers, H.J.H.

Overcoming the Limitations of Utility Design for Multiagent Systems

Managing Decentralized Inventory and Transhipment

The impact of stochastic lead times on the bullwhip effect a theoretical insight Michna, Zbigniew; Nielsen, Peter; Nielsen, Izabela Ewa

University of Groningen. Investment evaluation with respect to commercial uncertainty Broens, Douwe Frits

Online shopping and platform design with ex ante registration requirements

Modelling the trade off between period lenght and stages in a period batch control system Riezebos, Jan

Document Version Publisher s PDF, also known as Version of Record (includes final page, issue and volume numbers)

Algorithms for On-line Order Batching in an Order-Picking Warehouse

Optimizing multiple spaced seeds for homology search

Separability and Aggregation

This is a repository copy of Multi-commodity flow and station logistics resolution for train unit scheduling.

Université Libre de Bruxelles

A TALE OF TWO THEOREMS. (Submitted to RRPE May 25, 2014, MSNO# 3037) Abstract

The Mixed Strategy Equilibria and Adaptive Dynamics in the Bar Problem

Module 7:Application of stochastic processes in queueing theory Lecture 30:Examples of application of stochastic processes in Queueing Theory

Universiteit Leiden ICT in Business

Document Version Publisher s PDF, also known as Version of Record (includes final page, issue and volume numbers)

Transcription:

The online-tsp against fair adversaries Citation for published version (APA): Blom, M., Krumke, S. O., Paepe, de, W. E., & Stougie, L. (1999). The online-tsp against fair adversaries. (Memorandum COSOR; Vol. 9923). Eindhoven: Technische Universiteit Eindhoven. Document status and date: Published: 01/01/1999 Document Version: Publisher s PDF, also known as Version of Record (includes final page, issue and volume numbers) Please check the document version of this publication: A submitted manuscript is the version of the article upon submission and before peer-review. There can be important differences between the submitted version and the official published version of record. People interested in the research are advised to contact the author for the final version of the publication, or visit the DOI to the publisher's website. The final author version and the galley proof are versions of the publication after peer review. The final published version features the final layout of the paper including the volume, issue and page numbers. Link to publication General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. Users may download and print one copy of any publication from the public portal for the purpose of private study or research. You may not further distribute the material or use it for any profit-making activity or commercial gain You may freely distribute the URL identifying the publication in the public portal. If the publication is distributed under the terms of Article 25fa of the Dutch Copyright Act, indicated by the Taverne license above, please follow below link for the End User Agreement: www.tue.nl/taverne Take down policy If you believe that this document breaches copyright please contact us at: openaccess@tue.nl providing details and we will investigate your claim. Download date: 18. Apr. 2019

TU/e technische universiteit eindhoven / department of mathematics and computing science Memorandum CaSaR 99-23 The Online-TSP Against Fair Adversaries M. Blom, S.O. Krumke, W. de Paepe, L. Stougie Eindhoven, December 1999 The Netherlands

The Online-TSP Against Fair Adversaries Michiel Blom 1 *, Sven O. Krumke 2 **, Willem de Paepe3, and Leen Stougie 4 *** 1 KPN-Research, P. O. Box 421, 2260AK Leidschendam, The Netherlands, 2 Konrad-Zuse-Zentrum fiir Informationstechnik Berlin, Department Optimization, Takustr. 7, D-14195 Berlin-Dahlem, Germany, krumke<ozib.de 3 Faculty of Technology Management, Technische Universiteit Eindhoven, P. O. Box 513, 5600MB Eindhoven, The Netherlands, w.e.d.paepe<otm.tue.nl 4 Faculty of Mathematics and Computer Science, Technische Universiteit Eindhoven, P. O. Box 513, 5600MB Eindhoven, The Netherlands, L.Stougie<Otue.nl Abstract. In the online traveling salesman problem requests for visits to cities (points in a metric space) arrive online while the salesman is traveling. The salesman moves at no more than unit speed and starts and ends his work at a designated origin. The objective is to find a routing for the salesman which finishes as early as possible. We consider the online traveling salesman problem when restricted to the non-negative part of the real line. We show that a very natural strategy is 3/2-competitive which matches our lower bound. The main contribution of the paper is the presentation of a "fair adversary", as an alternative to the omnipotent adversary used in competitive analysis for online routing problems. The fair adversary is required to remain inside the convex hull of the requests released so far. We show that on lrt algorithms can achieve a strictly better competitive ratio against a fair adversary than against a conventional adversary. Specifically, we present an algorithm against a fair adversary with competitive ratio (1 + V17)/4 ~ 1.28 and provide a matching lower bound. We also show competitiveness results for a special class of algorithms (called diligent algorithms) that do not allow waiting time for the server as long as there are requests unserved. 1 Introduction The traveling salesman problem is a well studied problem in combinatorial optimization. In the classical setting, one assumes that the complete input of an instance is available for an algorithm to compute a solution. In many cases this * Supported by the TMR Network DONET ofthe European Community ERB TMRX- CT98-0202 ** Research supported by the German Science Foundation (DFG, grant Gr 883/5-2) * * * Supported by the TMR Network DONET ofthe European Community ERB TMRX CT98-0202

offline optimization model does not reflect the real-world situation appropriately. In many applications not all requests for points to be visited are known in advance. Decisions have to be made online without knowledge about future requests. Online algorithms are tailored to cope with such situations. Whereas offline algorithms work on the complete input sequence, online algorithms only see the requests released so far and thus, in planning a route, have to account for future requests that mayor may not arise at a later time. A common way to evaluate the quality of online algorithms is competitive analysis [3,5]. In this paper we consider the following online variant of the traveling salesman problem (called OLTSP in the sequel) which was introduced in [2]. Cities (requests) arrive online over time while the salesman is traveling. The requests are to be handled by a salesman-server that starts and ends his work at a designated origin. The objective is to find a routing for the server which finishes as early as possible (in scheduling theory this goal is usually referred to as minimizing the makespan). In this model it is feasible for the server to wait at the cost of time that elapses. Decisions are revocable, as long as they have not been executed. Only history is irrevocable. Previous work. Ausiello et al. [2] present a 2-competitive algorithm for OLTSP which works in general metric spaces. The authors also show that for general metric spaces no deterministic algorithm can be c-competitive with c < 2. For the special case that the metric space is JR, the real line, they give a lower bound of (9 + Vl7)/8 ~ 1.64 and a 7/4-competitive algorithm. Just very recently Lipmann [7] devised an algorithm that is best possible for this case with competitive ratio equal to the before mentioned lower bound. Our contribution. In this paper the effect of restricting the class of algorithms allowed and restricting the power of the adversary in the competitive analysis is studied. We introduce and analyze a new class of online algorithms which we call diligent algorithms. Roughly speaking, a diligent algorithm never sits idle while there is work to do. A precise definition is presented in Section 3 where we also show that in general diligent algorithms are strictly weaker than algorithms that allow waiting time. In particular we show that no diligent algorithm can achieve a competitive ratio lower than 7/4 for the OLTSP on the real line. The 7/4-competitive algorithm in [2] is in fact a diligent algorithm and therefore best possible within this restricted class of algorithms. We then concentrate on the special case of OLTSP when the underlying metric space is JRt, the non-negative part of the real line. In Section 4 we show that an extremely simple and natural diligent strategy is 3/2-competitive and that this result is best possible for (diligent and non-diligent) deterministic algorithms on IRt. The main contribution is contained in Section 5. Here we deal with an objection frequently encountered against competitive analysis concerning the unrealistic power of the adversary against which performance is measured. Indeed, in the OLTSP on the real line the before mentioned 7/4-competitive algorithm

reaches its competitive ratio against an adversary that moves away from the previously released requests without giving any information to the online algorithm. We introduce a fair adversary that is in a natural way restricted in the context of the online traveling salesman problem studied here. It should be seen as a more reasonable adversary model. A fair adversary always keeps its server within the convex hull of the requests released so far. We show that this adversary model indeed allows for lower competitive ratios. For instance, the above mentioned 3/2-competitive diligent strategy against the conventional adversary is 4/3-competitive against the fair adversary. This result is best possible for diligent algorithms against a fair adversary. I IDiligent Algorithms[General Algorithms General Adversary LB = DB = 3/2 LB = DB = 3/2 Fair Adversary LB = DB = 4/3 LB = DB = (1 + 17)/4 Table 1. Overview of the lower bound (LB) and upper bound (DB) results for the competitive ratio of deterministic algorithms for OLTSP on lr;j in this paper. We also present a non-diligent algorithm with competitive ratio (1 +V17) / 4 ~ 1.28 < 4/3 competing against the fair adversary. Our result is the first one that shows that waiting is actually advantageous in the OLTSP. The before mentioned algorithm in [7] also uses waiting, but became known after the one presented in this paper and has not been officially published yet. Such results are known already for online scheduling problems (see e.g. [6,4,8]) and, again very recently, also for an online dial-a-ride problem [l]. Our competitiveness result is complemented by a matching lower bound on the competitive ratio of algorithms against the fair adversary. Table 1 summarizes our results for OLTSP on IRt. 2 Preliminaries An instance of the Online Traveling Salesman Problem (OLTSP) consists of a metric space M = (X, d) with a distinguished origin 0 EM and a sequence a = ai,..., am of requests. In this paper we are mainly concerned with the special case that M is IRt, the non-negative part of the real line endowed with the Euclidean metric, Le., X = IRt = {x E IR : x ~ O} and d(x, y) = Ix - yl. A server is located at the origin 0 at time 0 and can move at most at unit speed. Each request is a pair ai = (ti, Xi), where ti E IR is the time at which request ai is released (becomes known), and Xi E X is the point in the metric space requested to be visited. We assume that the sequence a = ai,...,am of requests is given in order of non-decreasing release times. For a real number t we denote by ast and a <t the subsequence of requests in a released up to time t andgtrictly before time t, respectively.

It is assumed that the online algorithm does neither have information about the time when the last request is released nor about the total number of requests. An online algorithm for OLTSP must determine the behavior of the server at a certain moment t of time as a function of all the requests in a<t (and the current time t). In contrast, the offline algorithm has information about all requests in the whole sequence a already at time O. A feasible online/offline solution is a route for the server which serves all requested points, where each request is served not earlier than the time it is released, and which starts and ends in the origin o. The objective in the OLTSP is to minimize the total completion time (also called the "makespan" in scheduling) of the server, that is, the time when the server has served all requests and returned to the origin. Let ALG(a) denote the completion time ofthe server moved by algorithm ALG on the sequence a of requests. We use OPT to denote the optimal offline algorithm. An online algorithm ALG for OLTSP is c-competitive, if there exists a constant c such that for every request sequence a the inequality ALG(a) :::; c,opt(a) holds. 3 Diligent algorithms In this section we introduce a particular class of algorithms for OLTSP which we call diligent algorithms. Intuitively, a diligent algorithm should never sit and wait when it could serve yet unserved requests. A diligent server should also move towards work that has to be done directly without any detours. To translate this intuition into a rigorous definition some care has to be taken. Definition 1 (Diligent Algorithm). An algorithm ALG for OLTSP is called diligent, if it satisfies the following conditions: 1. If there are still unserved requests, then the direction of the server operated by ALG changes only if a new request becomes known, or the server is either in the origin or at a request that has just been served. 2. At any time when there are yet unserved requests, the server operated by ALG either moves towards an unserved request or the origin at maximum (i.e. unit) speed. The latter case is only allowed if the server operated by ALG is not yet in the origin. We emphasize that a diligent algorithm is allowed to move its server towards an unserved request and change his direction towards another unserved request or to the origin at the moment a new request becomes known. Lemma 1. No diligent online algorithm for OLTSP on the real line lr has competitive ratio of less than 7/4. Proof. Suppose that ALG is a diligent algorithm for OLTSP on the real line. Consider the following adversarial input sequence. At time 0 two requests al = (0,1/2) and a2 = (1/2,0) are released. There will be no further requests before

time 1. Thus, by the diligence of the algorithm the server will be at the origin at time 1. At time 1 two new requests at points 1 and -1, respectively, are released. Since the algorithm is diligent, starting at time 1 it must move its server to one of these requests at maximum, i.e., unit, speed. Without loss of generality assume that this is the request at 1. ALG's server will reach this point at time 2. Starting at time 2, ALG will have to move its server either directly towards the unserved request at -lor towards the origin, which essentially gives the same movement and implies that the server is at the origin at time 3. At that time, the adversary issues another request at 1. Thus, ALG'S server will still need at least 4 time units to serve -1 and 1 and return at the origin. Therefore, he will not be able to complete its work before time 7. The adversary handles the sequence by first serving the request at -1, then the two requests at 1 and finally returns to the origin at time 4, yielding the desired result. 0 This lower bound shows that the 7/4-competitive algorithm presented in [2], which is in fact a diligent algorithm is best possible within the class of diligent algorithms for the OLTSP on the real line. 4 The Oltsp on the non-negative part of the real line We first consider OLTSP on IRt when the offline adversary is the conventional (omnipotent) opponent. Theorem 1. No deterministic algorithm for OLTSP on IRt has a competitive ratio of less than 3/2. Proof. At time 0 the request 0"1 = (0,1) is released. Let T be the time that the server operated by ALG has served the request 0"1 and returned to the origin O. If T 2:: 3, then no further request is released and ALG is no better than 3/2 competitive since OPT(O"l) = 2. Thus, assume that T < 3. In this case the adversary releases a new request 0"2 = (T, T). Clearly, OPT(O"l, 0"2) = 2T. On the other hand ALG(O"l, 0"2) 2:: 3T, yielding a competitive ratio of 3/2. 0 The following extremely simple strategy achieves a competitive ratio that matches this lower bound (as we will show below): Strategy mrin("move-right-if-necessary") If a new request is released and the request is to the right of the current position of the server operated by MRIN, then the MRIN-server starts to move right at full speed. The server continues to move right as long as there are yet unserved requests to the right of the server. If there are no more unserved requests to the right, then the server moves towards the origin 0 at full speed. It is easy to verify that Algorithm MRIN is in fact a diligent algorithm. The following theorem shows that the strategy has a best possible competitive ratio for OLTSP on IRt.

Theorem 2. Strategy MRIN is a diligent 3/2-competitive algorithm for the OLTSP on the non-negative part IRt of the real line. Proof. We show the theorem by induction on the number of requests in the sequence u. It clearly holds if U contains at most one request. The induction hypothesis is that it holds for any sequence of m - 1 requests. Suppose that request Urn = (t,x) is the last request of U= Ul,,Urn-l,Urn If t = 0, then MRIN is obviously 3/2-competitive, so we will assume that t > O. Let f be the position of the request unserved by the MRIN-server at time t (excluding urn), which is furthest away from the origin. In case x ::; f, MRIN'S cost for serving U is equal to the cost for serving the sequence consisting of the first m - 1 requests of u. Since new requests can never decrease the optimal offline cost, the induction hypothesis implies the theorem. Now assume that f < x. Thus, at time t the request in x is the furthest unserved request. MRIN will complete its work no later than time t + 2x. The optimal offline cost OPT(U) is bounded from below by max{t + x, 2x}. Therefore, MRIN(U) t+x x t+x x 3 ----,-'-'- < + <--+ - = -. OPT(U) - OPT(U) OPT(U) - t + x 2x 2 o The result established above can be used to obtain competitiveness results for the situation of the OLTSP on the real line when there are more than one server, and the goal is to minimize the time when the last of its servers returns to the origin 0 after all requests have been served. Lemma 2. There is an optimal offline strategy for OLTSP on the real line with k 2 2 servers such that no server ever crosses the origin. Proof. Omitted in this abstract. o Corollary 1. There is a 3/2-competitive algorithm for the OLTSP with k 2 2 servers on the real line. 0 5 Fair Adversaries The adversaries used in the bounds of the previous section are abusing their power in the sense that they can move to points where they know a request will pop up without revealing the request to the online server before reaching the point. As an alternative we propose the following more reasonable adversary that we baptized fair adversary. We show that we can obtain better competitive ratios for the OLTSP on IRt under this model. We will also see that under this adversary model there does exist a distinction in competitiveness between diligent and non-diligent algorithms. Recall that U <t is the subsequence of U consisting of those requests with release time strictly smaller than t.

Definition 2 (Fair Adversary). An offline adversary for the OLTSP in the Euclidean space (IR n, 11.11) is fair, if at any moment t, the position of the server operated by the adversary is within the convex hull of the origin 0 and the requested points from a<t. In the special case of IRt a fair adversary must always keep its server in the interval [0, F], where F is the position of the request with the largest distance to the origin among all requests released so far. The following lower bound result shows that the OLTSP on the real line against fair adversaries is still a non-trivial problem. Theorem 3. No deterministic algorithm for OLTSP on IR has competitive ratio less than (5 +../57)/8 ~ 1.57 against a fair adversary. Proof. Suppose that there exists a c-competitive online algorithm. The adversarial sequence starts with two requests at time 0, al = (0,1) and a2 = (0, -1). Without loss of generality, we suppose that the first request that is served is al. At time 2 the online server can't have served both requests. We distinguish two main cases divided in some sub-cases. Case 1: None of the requests has been served at time 2. - If at time 3 request al is still unserved, let t' be the first time the server crosses the origin after serving the request. Clearly, t' ~ 4. At time t' the online server still has to visit the request in -1. If t' > 4c - 2 the server can not be c-competitive because the fair adversary can finish the sequence at time 4. Thus, suppose that 4 :::; t' :::; 4c - 2. At time t' a new request a3 = (t', 1) is released. The online server can not finish the complete sequence before t' + 4, whereas the adversary needs at t' + 1. Therefore, c ~ ~:t1 and for 4 :::; t' :::; 4c - 2 we have that (4c - 2) + 4 4c + 2 c~ = (4c - 2) + 1 4c - 1 implying c ~ (5 +../57)/8. - If at time 3 the request al has already been served, the online server can not be to the left of the origin at time 3 (given the fact that at time 2 no request had been served). The adversary now gives a new request a3 = (3,1). There are two possibilities: either a2, the request in -1, is served before a3 or the other way round. If the server decides to serve a2 before a3 then it can not complete before time 7. Since the adversarycomplbtes the sequence in time 4, the competitive ratio is at least 7/4. Ifthe online server serves a3 first, then again, let t' be the time that the server crosses the origin after serving a3. As before, we must have 4 :::; t' :::; 4c - 2. At time t' the fourth request a 4 = (t', 1) is released. The same arguments as above apply to show that the algorithm is at least (5 +../57)/8-competitive.

Case 2: One of the requests has been served at time 2 by the online server. We assume without loss of generality that 0"1 has been served. At time 2 the third request 0"3 = (2,1) is released. In fact, we are back in the situation in which at time 2 none of the two requests are served. In case the movements of the online server are such that no further request is released by the adversary, the latter will complete at time 4. In the other cases the last released requests are released after time 4 and the adversary can still reach them in time. 0 For comparison, the lower bound on the competitive ratio for the OLTSP in IR against an adversary that is not restricted to be fair is (9 + V'f7)/8 [2]. As mentioned before, only recently Lipmann [7] presented a (9 + V'f7)/8-competitive algorithm against a non-fair adversary. He conjectures that a similar type of algorithm will also be best possible against a fair adversary. In contrast, the picture for the problem on the non-negative part of the real line is already complete (see Theorems 5 and 6 for diligent algorithms and Theorems 4 and 7 for non-diligent algorithms below). Theorem 4. No deterministic algorithm for OLTSP on Rho has competitive ratio of less than (1 + V'f7)/4 ~ 1.28 against a fair adversary. Proof. Suppose that ALG is c-competitive. At time 0 the adversary releases request 0"1 = (0,1). Let T denote the time that the server operated by ALG has served this request and is back at the origin. For ALG to be c-competitive, we must have that T :s c OPT(O"l) = 2c, otherwise no further requests will be released. At time T the adversary releases a second request 0"2 = (T,l). The completion time of ALG becomes then at least T + 2. On the other hand, starting at time 0 the fair adversary moves its server to 1, lets it wait there until time T and then goes back to the origin 0 yielding a completion time of T + 1. Therefore, ALG(O") T+2 2c+2 1 ----'--'-->-- >--=1+-- OPT(O") - T + 1-2c + 1 2c + l' given the fact that T :s 2c. Since by assumption ALG is c-competitive, we have that 1 + 1/(2c + 1) :s c, implying that c ~ (1 + V'f7)/4. 0 For diligent algorithms we can show a higher lower bound against a fair adversary. Theorem 5. No deterministic diligent algorithm for OLTSP on IRt has competitive ratio of less than 4/3 against a fair adversary. Proof. Consider the adversarial sequence 0"1 = (0,1),0"2 = (1,0), and 0"3 = (2,1). By its diligence the online algorithm will start to travel to 1 at time 0, back to 0 at time 1, arriving there at time 2. Then its server has to visit 1 again, so that he will finish no earlier than time 4. Obviously, the optimal offline solution is to leave 1 not before time 2, and finishing at time 3. 0

We show now that the algorithm MRIN presented before has a better competitive ratio against the fair adversary than the ratio of 3/2 achieved against a conventional adversary. In fact we show that the ratio matches the lower bound for diligent algorithms proved in the previous theorem. Theorem 6. Strategy MRIN is a 4/3-competitive algorithm for the OLTSP on IRt against a fair adversary. Proof. Omitted in this abstract. Thus, Algorithm MRIN attains a best possible competitive ratio against the fair adversary among all diligent algorithms. Given the lower bound for general non-diligent algorithms in Theorem 4 we aim now at designing an online algorithm that obtains better competitive ratios against a fair adversary. In view of Theorem 5 such an algorithm will have to be non-diligent, Le., incorporate waiting times. The problem with Algorithm MRIN is that shortly after it starts to return towards the origin from the furthest previously unserved request, a new request to the right of its server arrives. In this case the MRIN-server has to return to a position it just left. Algorithm ws presented below attempts successfully to avoid this pitfall. Strategy ws("wait Smartly") The WS-server moves right if there are yet unserved requests to the right of his present position. Otherwise, it takes the following actions. Suppose it arrives at his present position, which is a currently rightmost unserved request, s(t) at time t. 1. Compute the the optimal offline solution value OPT(lT::;t) for all requests released up to time t. 2. Determine a waiting time W := a. OPT(lT<t) - s(t) - t, with a = (1 + V17)/4. - 3. Wait at point s(t) until time t + Wand then start to move back to the origin O. We notice that when the server is moving back to the origin and no new requests are released until time t + W + s(t), then the WS-server reaches the origin 0 at time t + W + s(t) = a OPT(lT<t) having served all requests released so far. If a new request is released at time t' :S W + t + s(t) and the request is to the right of s(t'), then the WS-server starts to move to the right immediately until it reaches the furthest unserved request. Theorem 7. Algorithm WS is a-competitive with 0: = (1 + V17)/4 ~ 1.28 for the OLTSP on lr; against a fair adversary. Proof. By the definition of the waiting time it is sufficient to prove that at any point where a waiting time is computed this waiting time is non-negative. In that case the server will always return at 0 before time 0: OPT(lT). This is clearly true if the sequence IT contains at most one request. We make the induction hypothesis that it is also true for any sequence of at most m - 1 requests.

Let a = al,..., am be any sequence of requests and let am =: (t, x) be the request released last. If t = 0, then there is nothing left to show, so we will assume for the remainder of the proof that t > O. We denote by set) and s*(t) the positions of the ws- and the fair adversary's server at time t, respectively. We also let rf = (tf,j) be the furthest (i.e. most remote from the origin) yet unserved request by ws at time t excluding the request am' Finally, let rf = (tf, F) be the furthest released request in al,...,am-l. Obviously f::; F. Again, we distinguish three different cases depending on the position of x relative to f and F. Case 1: x ::; f Since the ws-server has to travel to f anyway and by the induction hypothesis there was a non-negative waiting time in f or set) (depending on whether set) > f or set) ::; j) before request am was released, the waiting time in f or set) can not decrease since the optimal omine completion time can not decrease by an additional request). Case 2: f ::; x < F If set) :::: x, then again by the induction hypothesis and the fact that the route length of ws's server does not increase, the possible waiting time at set) is nonnegative. Thus we can assume that set) < x. The WS-server will now travel to point x, arrive there at time t + d(s(t),x), and possibly wait there some time W before returning to the origin, with W = a OPT(a) - (t + d(s(t), x)) - x. Inserting the obvious lower bound OPT(a) :::: t + x yields W:::: (a -l)opt(a) - d(s(t),x). To bound OPT(a) in terms of d(s(t), x) consider the time t' when the wsserver had served the request at F and started to move left. Clearly t' < t since otherwise set) could not be smaller than x as assumed. Thus, the subsequence a9' of a does not contain (t, x). By the induction hypothesis, ws is a-competitive for the sequence a<t'. At time t' when he left F he would have arrived in the origin at time aopt(a::;t'), i.e., t :::: a2f - F + d(f, set)) = (2a - l)f + d(s(t), F). Since by assumption we have set) < x < F we get that d(s(t), x) ::; d(s(t), F) and d(s(t),x) ::; F, which inserted in (3) yields t:::: (2a -l)d(s(t),x) +d(s(t),x) = 2ad(s(t),x). We combine this with the previously mentioned lower bound OPT(a) :::: t + x to obtain: (5) OPT(a) :::: 2ad(s(t), x) + x:::: (2a + l)d(s(t),x). (1) t' + F = a OPT(a9')' (2) Notice that t :::: t' + d(f, set)). Since OPT(a9') :::: 2F we obtain from (2) that (3) (4)

Using inequality (5) in (1) gives We will show that also in this case W ~ o. At time t the adversary's server still has to travel at least d(s* (t), x) + x units. This results in OPT(a) ~ t + d(s*(t),x) + x. Since the offline adversary is fair, its position s*(t) at time t can not be strictly to the right of F. (7) Insertion into (6) yields W ~ (a -1)(2a + l)d(s(t), x) - d(s(t),x) =(2a 2 - a - 2)d(s(t),x) = ( 9 +4 Vl7-1+:U -2) d(s(t), x) =0. This completes the proof for the second case. Case 3: f ~ F ~ x Starting at time t the WS-server moves to the right until he reaches x, and after waiting there an amount W returns to 0, with W = a opt(a) - (t + d(s(t), x)) - x. OPT(a) ~ t + d(f, x) + x. W ~ (a -l)opt(a) - d(s(t),f) since F > s(t) by definition of the algorithm. The rest of the arguments are similar to those used in the previous case. Again that Ws's server started to move to the left from F at some time t' < t, and we have t' + F = a. opt(a~:::t'). (9) Since t ~ t' + d(s(t), F) and opt(a:st') ~ 2F we obtain from (9) that t ~ a2f - F + d(s(t), F) = (2a - l)f + d(s(t), F) ~ 2ad(s(t), F). We combine this with (7) and the fact that x ~ d(s(t), F) to achieve opt(a) ~ 2ad(s(t), F) + d(f, x) + x ~ (2a + l)d(s(t), F). Using this inequality in (8) gives W ~ (a - 1)(2a + l)d(s(t), F) - d(s(t), F) =(2a 2 - a - 2)d(s(t), F) = ( 9 +:U-1+4 Vl7-2) d(s(t),f) (6) (8) = O. This completes the proof. o

6 Conclusions We introduced an alternative more fair performance measure for online algorithms for the traveling salesman problem. The first results are encouraging. On the non-negative part of the real line the fair model allows a strictly lower competitive ratio than the conventional model with an omnipotent adversary. Next to that we considered a restricted class of algorithms for the online traveling salesman problems, suggestively called diligent algorithms. We showed that in general diligent algorithms have strictly higher competitive ratios than algorithms that sometimes leaves the server idle, to wait for possible additional information. In online routing companies, like courier services or transportation companies waiting instead of immediately starting as soon as requests are presented is common practice. Our results support this strategy. It is still open to find a best possible non-diligent algorithm for the problem on the real line against a fair adversary. However, it is very likely that an algorithm similar to the best possible algorithm presented in [7] against a non-fair adversary will appear to be best possible for this case. We notice here that for general metric spaces the lower bound of 2 on the competitive ratio of algorithms in [2] is established with a fair adversary as opponent. Moreover, a diligent algorithm is presented which has a competitive ratio that meets the lower bound. We hope to have encouraged research into ways to restrict the power of adversaries in online competitive analysis. Acknowledgement: Thanks to Maarten Lipmann for providing the lower bound in Theorem 3. References 1. N. Ascheuer, S. O. Krumke, and J. Rambau. Online dial-a-ride problems: Minimizing the completion time. In Proceedings of the 17th International Symposium on Theoretical Aspects of Computer Science, Lecture Notes in Computer Science, 2000. To appear. 2. G. Ausiello, E. Feuerstein, S. Leonardi, L. Stougie, and M. Talamo. Algorithms for the on-line traveling salesman. Algorithmica, 1999. To appear. 3. A. Borodin and R. El-Yaniv. Online Computation and Competitive Analysis. Cambridge University Press, 1998. 4. B. Chen, A. P. A. Vestjens, and G. J. Woeginger. On-line scheduling of two-machine open shops where jobs arrive over time. Journal of Combinatorial Optimization, 1:355-365, 1997. 5. A. Fiat and G. J. Woeginger, editors. Online Algorithms: The State of the Art, volume 1442 of Lecture Notes in Computer Science. Springer, 1998. 6. J. A. Hoogeveen and A. P. A. Vestjens. Optimal on-line algorithms for singlemachine scheduling. In Proceedings of the 5th Mathematical Programming Society Conference on Integer Programming and Combinatorial Optimization, Lecture Notes in Computer Science, pages 404-414, 1996.

7. M. Lipmann. The online traveling salesman problem on the line. Master's thesis, Department of Operations Research, University of Amsterdam, The Netherlands, 1999. 8. C. Philips, C. Stein, and J. Wein. Minimizing average completion time in the presence of release dates. In Proceedings of the 4th Workshop on Algorithms and Data Structures, volume 955 of Lecture Notes in Computer Science, pages 86-97, 1995.